| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISALENTO991001027639707536 |
|
|
Autore |
Svevo, Italo |
|
|
Titolo |
Saggi e pagine sparse / Italo Svevo ; a cura e con prefazione di Umbro Apollonio |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collana |
|
I quaderni dello specchio |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910510604803321 |
|
|
Titolo |
Engineering secure software and systems : third International Symposium, ESSOS 2011, Madrid, Spain, February 9-10, 2011 : proceedings / / Ulfar Erlingsson, Roel Wieringa, Nicola Zannone (eds.) |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York, : Springer, 2011 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2011.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XI, 273 p. 69 illus., 21 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Lecture notes in computer science, , 0302-9743 ; ; 6542 |
LNCS sublibrary. SL 4, Security and cryptology |
|
|
|
|
|
|
|
|
Altri autori (Persone) |
|
ErlingssonUlfar |
WieringaRoel |
ZannoneNicola |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Software engineering |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the Third International Symposium on Engineering Secure Software and Systems, ESSoS 2011, held in Madrid, Italy, in February 2011. The 18 revised full papers presented together with 3 idea papers were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on model-based security, tools and mechanisms, Web security, security requirements engineering, and authorization. |
|
|
|
|
|
|
|
| |